Difference between revisions of "Spooks Portal"
Tom Griffin (talk | contribs) (Wanted pages) |
Tom Griffin (talk | contribs) (Elements of intelligence) |
||
Line 70: | Line 70: | ||
<!---------------------------Categories------------------------> | <!---------------------------Categories------------------------> | ||
|- | |- | ||
− | ! <h2 style="margin:0; background:#d9f7d4; font-size:120%; font-weight:bold; border:1px solid #7ba06d; text-align:left; color:#000; padding:0.2em 0.4em;"> | + | ! <h2 style="margin:0; background:#d9f7d4; font-size:120%; font-weight:bold; border:1px solid #7ba06d; text-align:left; color:#000; padding:0.2em 0.4em;">The Elements of Intelligence</h2> |
− | + | Despite the secrecy which surrounds intelligence agencies, the general nature of their activities is well-known, being based on practices that are thousands of years old. Each of the four main intelligence disciplines present profound issues for democratic societies. | |
<!---------------------------Research------------------------> | <!---------------------------Research------------------------> | ||
|- | |- | ||
− | ! <h2 style="margin:0; background:#d9f7d4; font-size:120%; font-weight:bold; border:1px solid #7ba06d; text-align:left; color:#000; padding:0.2em 0.4em;"> | + | ! <h2 style="margin:0; background:#d9f7d4; font-size:120%; font-weight:bold; border:1px solid #7ba06d; text-align:left; color:#000; padding:0.2em 0.4em;">Intelligence collection</h2> |
|- | |- | ||
|style="color:#000;"| | |style="color:#000;"| | ||
− | + | *[[Human intelligence]]: The age old practice in which intelligence officers recruit agents with access to information: e.g [[Robert Hanssen]], [[Jonathan Pollard]]. | |
+ | *[[Paper mill]]: A source which fabricates or embellishes intelligence for pecuniary advantage. e.g allegedly [[Laura Montini]]. | ||
+ | *[[Double agent]]: an agent who is secretly working for a rival agency, e.g. [[Kim Philby]], allegedly [[Ahmad Chalabi]] | ||
+ | *[[Defector]]: A source who flees rather than remains in place, and whose intelligence, as opposed to propaganda value, therefore tends to diminish over time, e.g. [[Anatoliy Golitsyn]], [[Yuri Nosenko]], [[Oleg Gordievsky]]. | ||
+ | *[[Technical intelligence]]: Includes techniques such as [[Imagery intelligence]] obtained from aerial or satellite reconnaissance and [[Signals intelligence]] such as the intereception of communications engaged in by the US [[National Security Agency]] and Britain's [[GCHQ]]. | ||
+ | *[[Open source collection]] Intelligence from overt sources such as media and diplomatic reports. | ||
+ | |- | ||
+ | ! <h2 style="margin:0; background:#d9f7d4; font-size:120%; font-weight:bold; border:1px solid #7ba06d; text-align:left; color:#000; padding:0.2em 0.4em;">Intelligence analysis</h2> | ||
+ | |- | ||
+ | |style="color:#000;"| | ||
+ | *[[Technical analysis]]: includes techniques such as photo interpretation and code-breaking. | ||
+ | *[[Competitive analyis]]: System advocated by neoconservative theorists, in which multiple centres are encouraged to put forward competing interpretations of raw intelligence data. Their opponents argue that this allows analysis to become politicised, e.g. [[Team B]], [[Rumsfeld Commission]], [[Office of Special Plans]]. | ||
+ | |- | ||
+ | ! <h2 style="margin:0; background:#d9f7d4; font-size:120%; font-weight:bold; border:1px solid #7ba06d; text-align:left; color:#000; padding:0.2em 0.4em;">Counterintelligence</h2> | ||
+ | |- | ||
+ | |style="color:#000;"| | ||
+ | *[[Classification]]: Categorisation of information according to its sensitivity, e.g. secret, top secret. | ||
+ | *[[Security]] Measures taken to obstruct hostile intelligence services such as personnel vetting and physical security. | ||
+ | *[[Counterespionage]]: Measures designed to actively frustrate a hostile intelligence service, such as surveillance and collection of intelligence on agents. | ||
+ | *[[Offensive counterintelligence]] Attempting to turn one's opponent's intelligence operations to one's own advantage, e.g. [[Operation Double-Cross]]. | ||
+ | *[[Deception]]: Operations designed to mislead an opponent's intelligence analysis, e.g. [[Operation Fortitude]] | ||
+ | *[[Feedback]]: Intelligence indicating whether a deception has successfully influenced an opponents analysis. | ||
+ | |- | ||
+ | ! <h2 style="margin:0; background:#d9f7d4; font-size:120%; font-weight:bold; border:1px solid #7ba06d; text-align:left; color:#000; padding:0.2em 0.4em;">Covert action</h2> | ||
+ | |- | ||
+ | |style="color:#000;"| | ||
+ | [[Covert action]] is a term of art used by the American intelligence community to describe "the attempt by a government or group to influence events in another state or territory without revealing its own involvement."<ref>Dirty Tricks or Trump Cards, by Roy Godson, Transaction Books, 2001, p.3.</ref> Similar terms include the British [[Special Political Action]] or [[Political warfare]] and the Russian [[aktivnye merpriiatiia]] or [[active measures]]. | ||
+ | *[[Intelligence support]] and [[Intelligence liason]] may be means of exercising covert influence, e.g. [[British Security Cooperation]] in the US during the Second World War. | ||
+ | *[[unilateral penetration]]: Spying on a friendly intelligence agency, sometimes conducted to assure the strength of the relationship. | ||
+ | *[[Agents of influence]] Individuals with whom an agency maintains a secret relationship so that they will be in a position to influence policy immediately or in the future. | ||
+ | *[[Front groups]] Organisations secretly created or aided by an agency to pursue its objectives, e.g. [[Congress for Cultural Freedom]]. | ||
+ | *[[White propaganda]]:Overt propaganda carried out openly on behlaf of its sponsor, e.g. the activities of the [[United States Information Agency]] or the [[British Council]]. | ||
+ | *[[Grey propaganda]]: Thinly disguised propaganda which is deniable but which may be seen for what it is by sophisticated observers. The output of [[Encounter]] magazine might be considered an example. | ||
+ | *[[Black propaganda]]: Propaganda whose source is heavily concealed and which may also be [[disinformation]], false information designed to mislead. Methods of dissemination include rumour and forgery. | ||
+ | *[[Paramilitary operations]]: Examples include US support for Cuban exiles at the [[Bay of Pigs]], the [[Contras]] and the Afghan Mujahideen. | ||
+ | *[[Assassination]]: Examples include the Russian-sponsored murder of [[Leon Trotsky], [[CIA]] attempts on the life of [[Fidel Castro]] and British attempts to kill [[Gamal Abdel Nasser]]. | ||
+ | *[[Special Forces]]: Covert deployments of special forces include for example, British operations in Yemen in the 1960s. | ||
+ | *[[Coup d'etat]]: Facilitating the overthrow of a government,e.g. the US and British-supported Iranian coup of 1953, [[Operation Ajax]]. | ||
<!---------------------------Recent Articles on SpinWatch------------------------> | <!---------------------------Recent Articles on SpinWatch------------------------> |
Revision as of 03:29, 12 November 2008
Welcome to the Spooks Portal on Spinprofiles | ||
---|---|---|
|
|
|
|
References
|